Results 1 to 10 of about 365,727 (157)
Detection and Classification of Novel Attacks and Anomaly in IoT Network using Rule based Deep Learning Model [PDF]
Attackers are now using sophisticated techniques, like polymorphism, to change the attack pattern for each new attack. Thus, the detection of novel attacks has become the biggest challenge for cyber experts and researchers.
Sanjay Chakraborty+3 more
semanticscholar +1 more source
Summary: Openly available community science digital vouchers provide a wealth of data to study phenotypic change across space and time. However, extracting phenotypic data from these resources requires significant human effort.
Maggie M. Hantak+3 more
doaj +1 more source
Bovine peptidoglycan recognition protein 1 (PGLY RP1) is an important receptor that binds to murein peptidoglycans (PGN) of Grampositive and Gram-negative bacteria and is, therefore, involved in innate immunity.
T. Zabolewicz+4 more
semanticscholar +1 more source
Formulation of the problem. At the present stage of the development of science education and information technology, their integration, complementarity, and implementation are essential.
Наталія Юркович+3 more
doaj +1 more source
Discovery and Biotechnology for the Better of Humanity and Environmental in Asia Region
Biotechnology is a rapidly growing cross-disciplinary field involving medicine, biology, chemistry, engineering, nanotechnology, and computer science.
Eny Kusrini+2 more
doaj +1 more source
MUC5B promoter rs35705950 T/G gene polymorphism has been associated with the risk of IPF, but the influence of this relationship varies among different populations.
Xiaozheng Wu+3 more
doaj +1 more source
A Proof of CSP Dichotomy Conjecture [PDF]
Many natural combinatorial problems can be expressed as constraint satisfaction problems. This class of problems is known to be NP-complete in general, but certain restrictions on the form of the constraints can ensure tractability.
Dmitriy Zhuk
semanticscholar +1 more source
Phantom Types and Subtyping [PDF]
We investigate a technique from the literature, called the phantom-types technique, that uses parametric polymorphism, type constraints, and unification of polymorphic types to model a subtyping hierarchy.
Fluet, Matthew, Pucella, Riccardo
core +1 more source
Relational Width of First-Order Expansions of Homogeneous Graphs with Bounded Strict Width [PDF]
Solving the algebraic dichotomy conjecture for constraint satisfaction problems over structures first-order definable in countably infinite finitely bounded homogeneous structures requires understanding the applicability of local-consistency methods in ...
Wrona, Micha?
core +3 more sources